|
@@ -1,53 +1,57 @@
|
|
|
package middleware
|
|
|
|
|
|
-//type CustomResponseWriter struct {
|
|
|
-// gin.ResponseWriter
|
|
|
-// body *bytes.Buffer
|
|
|
-// Host string
|
|
|
-//}
|
|
|
-//
|
|
|
-//func (w CustomResponseWriter) Write(b []byte) (int, error) {
|
|
|
-// w.body.Write(b)
|
|
|
-// if strings.Contains(w.Host, "cloud.long-chi.com") {
|
|
|
-// old := string(b)
|
|
|
-// //为兼容https,此处需要修改下
|
|
|
-// new := strings.ReplaceAll(old, "http://110.40.223.170:9000/", "https://cloud.long-chi.com/")
|
|
|
-// new = strings.ReplaceAll(new, "http://106.52.134.22:9099/", "https://cloud.long-chi.com/")
|
|
|
-// b = []byte(new)
|
|
|
-// }
|
|
|
-// return w.ResponseWriter.Write(b)
|
|
|
-//}
|
|
|
-//
|
|
|
-//func (w CustomResponseWriter) WriteString(s string) (int, error) {
|
|
|
-// w.body.WriteString(s)
|
|
|
-// return w.ResponseWriter.WriteString(s)
|
|
|
-//}
|
|
|
+import (
|
|
|
+ "fmt"
|
|
|
+ "github.com/gin-gonic/gin"
|
|
|
+ "iot_manager_service/app/file/dao"
|
|
|
+ "iot_manager_service/util/cache"
|
|
|
+ "iot_manager_service/util/common"
|
|
|
+ "iot_manager_service/util/token"
|
|
|
+ "net/http"
|
|
|
+ "strings"
|
|
|
+)
|
|
|
|
|
|
-//func CheckAuth() gin.HandlerFunc {
|
|
|
-// return func(ctx *gin.Context) {
|
|
|
-// //该路由下不校验token
|
|
|
-// if strings.Contains(ctx.Request.RequestURI, "/login") ||
|
|
|
-// strings.Contains(ctx.Request.RequestURI, "/captcha") ||
|
|
|
-// strings.Contains(ctx.Request.RequestURI, "/tenant/info") ||
|
|
|
-// strings.Contains(ctx.Request.RequestURI, "/api/ctwing/aep/callback") ||
|
|
|
-// strings.Contains(ctx.Request.RequestURI, "/token") {
|
|
|
-// ctx.Next()
|
|
|
-// return
|
|
|
-// }
|
|
|
-//
|
|
|
-// authorization := ctx.GetHeader(Authorization)
|
|
|
-// if authorization != "" {
|
|
|
-// token := ParseAccessToken(authorization)
|
|
|
-// if token != nil {
|
|
|
-// ctx.Set(Authorization, token)
|
|
|
-//
|
|
|
-// blw := &CustomResponseWriter{body: bytes.NewBufferString(""), ResponseWriter: ctx.Writer, Host: ctx.Request.Host}
|
|
|
-// ctx.Writer = blw
|
|
|
-// ctx.Next()
|
|
|
-// return
|
|
|
-// }
|
|
|
-// }
|
|
|
-// ctx.JSON(http.StatusUnauthorized, common.NormalResponse(http.StatusUnauthorized, "token is invalid", nil))
|
|
|
-// ctx.Abort()
|
|
|
-// }
|
|
|
-//}
|
|
|
+// 校验用户对文件的权限
|
|
|
+func CheckAuth() gin.HandlerFunc {
|
|
|
+ return func(c *gin.Context) {
|
|
|
+ header := c.GetHeader("Authorization")
|
|
|
+ claims, _ := token.JwtClaims.ParseJwtToken(header)
|
|
|
+ user, _ := cache.GetNowUser(claims.ID)
|
|
|
+ fileid := c.Query("fileid")
|
|
|
+
|
|
|
+ filedao := &dao.File{}
|
|
|
+ file, err := filedao.GetFile(fileid)
|
|
|
+ if err != nil {
|
|
|
+ c.JSON(http.StatusOK, err)
|
|
|
+ c.Abort()
|
|
|
+ return
|
|
|
+ }
|
|
|
+ userAuth := user.User.AuthId
|
|
|
+ fileAuth := file.AuthId
|
|
|
+
|
|
|
+ var permissionMap = map[string]struct {
|
|
|
+ index int
|
|
|
+ message string
|
|
|
+ }{
|
|
|
+ "/viewfile": {0, "查看"},
|
|
|
+ "/downloadfile": {1, "下载"},
|
|
|
+ "/forwardingfile": {2, "转发"},
|
|
|
+ }
|
|
|
+
|
|
|
+ for url, obj := range permissionMap {
|
|
|
+ if strings.Contains(c.Request.RequestURI, url) {
|
|
|
+ if fileAuth[obj.index] != '1' {
|
|
|
+ c.JSON(http.StatusForbidden, common.StatusForbidden(fmt.Sprintf("抱歉,该文件不支持【%s】操作,请联系管理员。", obj.message), nil))
|
|
|
+ c.Abort()
|
|
|
+ return
|
|
|
+ }
|
|
|
+ if userAuth[obj.index] != fileAuth[obj.index] || userAuth[obj.index] != '1' {
|
|
|
+ c.JSON(http.StatusForbidden, common.StatusForbidden(fmt.Sprintf("抱歉,您没有【%s】该文件权限,请联系管理员。", obj.message), nil))
|
|
|
+ c.Abort()
|
|
|
+ return
|
|
|
+ }
|
|
|
+ }
|
|
|
+ }
|
|
|
+ c.Next()
|
|
|
+ }
|
|
|
+}
|